Thank you Fortinet FortiGuard Labs for the Early Share with Cyber Threat Alliance Members: Real-Time Anti-Phishing: Essential Defense Against Evolving Cyber Threats https://lnkd.in/gikQj6wM Members of CTA often share threat blogs, research, reports, with each other early - generally 24-72 hours before they post the threat information publicly. This allows CTA members to be aware and prepare for what is coming. Priceless! Be aware & prepare - join CTA! #CTAearlyshares #threatintelligence #EmpoweringCTA #threatresearch #cybersecurity
Cyber Threat Alliance
Computer and Network Security
Arlington, VA 6,233 followers
Securing Our Digital Ecosystem By Working Together. Care to join us?
About us
The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers. The CTA will advance the cybersecurity of critical IT infrastructures and increase the security, availability, integrity, and efficiency of information systems by enabling the near real-time sharing of campaign-based cybersecurity information.
- Website
-
cyberthreatalliance.org
External link for Cyber Threat Alliance
- Industry
- Computer and Network Security
- Company size
- 2-10 employees
- Headquarters
- Arlington, VA
- Type
- Nonprofit
- Founded
- 2017
Locations
-
Primary
3033 Wilson Boulevard
700
Arlington, VA 22201, US
Employees at Cyber Threat Alliance
Updates
-
The Cyber Threat Alliance introduced its Responsible Vulnerability Communication Policy, laying out guidelines for responsibly handling disclosed vulnerabilities in any product or system in a way that optimizes secure outcomes. The CTA and its members created this policy in response to decades of discussion across the industry about how to responsibly discuss vulnerabilities. Practitioners have long debated how to disclose newly identified vulnerabilities in software offerings and how companies should proceed after learning about vulnerabilities in their own products through third parties. The development of and enthusiastic response to this policy is a sign of a maturing cybersecurity industry. The new policy is a strong example of greater standardization of ethical practices across the industry, better alignment with globally recognized standards, and increased transparency and collaboration among software vendors, government agencies, and researchers. The Responsible Vulnerability Communication Policy reflects a shift from ad hoc responses to a common framework and set of standards that guide how we approach and implement vulnerability disclosure. In a recent Q&A, CTA CEO Michael Daniel discussed the new policy, providing his perspective on what it means for advancing cyber resilience at scale. https://lnkd.in/gYMxe7mA More from CTA: https://lnkd.in/g8heySNr
-
Thank you Symantec Team for the early share with Cyber Threat Alliance: RansomHub: Attackers Leverage New Custom Backdoor https://lnkd.in/gKTaMR8v Members of CTA often share threat blogs, research, reports, with each other early - generally 24-72 hours before they post the threat information publicly. This allows CTA members to be aware and prepare for what is coming. Priceless! Be aware & prepare - join CTA! #CTAearlyshares #threatintelligence #EmpoweringCTA #threatresearch #cybersecurity #ransomware
-
Thank you Cisco Talos & team for the early share with Cyber Threat Alliance members: UAT-5918 targets critical infrastructure entities in Taiwan https://lnkd.in/g6PxP_Vw Members of CTA often share threat blogs, research, reports, with each other early - generally 24-72 hours before they post the threat information publicly. This allows CTA members to be aware and prepare for what is coming. Priceless! Be aware & prepare - join CTA! #CTAearlyshares #threatintelligence #EmpoweringCTA #threatresearch #cybersecurity
-
Thank you Palo Alto Networks Unit 42 & Laura Novak for the Early Share with Cyber Threat Alliance members: Off the Beaten Path: Recent Unusual Malware https://lnkd.in/dmVKvY_i Members of CTA often share threat blogs, research, reports, with each other early - generally 24-72 hours before they post the threat information publicly. This allows CTA members to be aware and prepare for what is coming. Priceless! Be aware & prepare - join CTA! #CTAearlyshares #threatintelligence #EmpoweringCTA #threatresearch #cybersecurity
-
Thank you Scitum S.A. de C.V. for the Early Share with Cyber Threat Alliance members: Golden Jaguar, new threat targeting Brazil https://lnkd.in/g2VHfEWd Members of CTA often share threat blogs, research, reports, with each other early - generally 24-72 hours before they post the threat information publicly. This allows CTA members to be aware and prepare for what is coming. Priceless! Be aware & prepare - join CTA! #CTAearlyshares #threatintelligence #EmpoweringCTA #threatresearch #cybersecurity
-
The Cyber Threat Alliance is once again sponsoring the Virus Bulletin conference Threat Intelligence Practitioners Summit (TIPS track). The conference is planned to be an in-person event in Berlin, Germany, and is scheduled for September 24-26th. Our TIPS track will be on Thursday, September 25th. The theme for the TIPS track is: Community Driven Threat Defense. Please submit your abstract to the TIPS track to events@cyberthreatalliance.org #cybersecurity #threatintelligence #cyberdefense #strongertogether #CFP #cyberesearch https://lnkd.in/gJn-emPH
-
Thank you Symantec Team for the early share with Cyber Threat Alliance members: AI: Advent of Agents Opens New Possibilities for Attackers https://lnkd.in/gyme9yMU Members of CTA often share threat blogs, research, reports, with each other early - generally 24-72 hours before they post the threat information publicly. This allows CTA members to be aware and prepare for what is coming. Priceless! Be aware & prepare - join CTA! #CTAearlyshares #threatintelligence #EmpoweringCTA #threatresearch #cybersecurity
-
Thank you Palo Alto Networks Unit 42 & Laura Novak for the Early Share with Cyber Threat Alliance members: Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims https://lnkd.in/ghGwyhXG Members of CTA often share threat blogs, research, reports, with each other early - generally 24-72 hours before they post the threat information publicly. This allows CTA members to be aware and prepare for what is coming. Priceless! Be aware & prepare - join CTA! #CTAearlyshares #threatintelligence #EmpoweringCTA #threatresearch #cybersecurity
-
Thank you K7 Computing for the Early Share with Cyber Threat Alliance Members: Tracking Emmenhtal https://lnkd.in/g_brTxFM Members of CTA often share threat blogs, research, reports, with each other early - generally 24-72 hours before they post the threat information publicly. This allows CTA members to be aware and prepare for what is coming. Priceless! Be aware & prepare - join CTA! #CTAearlyshares #threatintelligence #EmpoweringCTA #threatresearch #cybersecurity